Network Administrators Commonly Used Commands

Enabling Network Interface eth0

Login as root and execute the command at the terminal to bring up eth0

ifup eth0

The system would determine an IP address for interface eth0 and return a prompt.
Now, type a command

ifconfig

to view the configuration on a currently active interfaces and the loopback interface. The command is used to configure the kernel-resident network interfaces. If interface name is given as an argument, the details of the that specific interface displayed

ifconfig eth0

Display all interfaces details including disabled interfaces

ifconfig -a

Enable an Interface

ifconfig eth0 up

Disable an Interface

ifconfig eth0 down

Assign IP address to an Interface

ifconfig eth0 174.142.46.71

Change MTU

ifconfig eth0 mtu XX

The DHCP dynamically assign an IP address to eth0 on the system.

Fedora tested new Linux Network device naming scheme, as implemented by the biosdevname utility provided by Dell. It would give network interfaces names that are both consistent and appropriate to their physical attributes.

who command

who [options] [filename]

To find out the time of last system boot, current run level of the system and list of logged in users and more.

who

To get the information about currently logged in user on the system which includes login name, terminal line numbers, login time, remote host name

Get the list of users logged in to system

who -u

Details of the current logged in user

who -a

Get system's username

whoami

Get user identification information

id

Get the count of users logged on to system

who -q -H

Get hostname and user associated with standard input such as a keyboard

who -m -H

Display all active processes which are spawned by INIT process

who -p -H

Find status of the user's message as +, – or?

who -T -H

Last boot time of the system

who -b -H

Get the details of all dead processes

who -d -H

System login process details

who -l -H

Current run level of the system

who -r

uptime command

uptime [-options]

To find out how long the system is active or running. It displays the current time, amount of system is in running state, the number of users currently logged, load time for the pat 1, 5 and 15 minutes respectively.

Options:
-p, –pretty show uptime in pretty format i.e., human readable format
-h, –help display this help and exit
-s, –since system up since when the system started running
-V, –version output version information and exit

Command w

Get the list of users and their activities

w

It's a combination of uptime and who commands given one immediately after the other.

top command

top [-b] [-nCOUNT] [-dSECONDS] [-m]

Displays system and processes information as:

First Row show: current time, uptime of the machine, users sessions logged in, and average load on the system to the last minute, five minutes and 15 minutes respectively.

Second Row: Total Processes running, Running Processes, Sleeping Processes, Stopped Processes, Processes waiting to be stopped from the parent process

Third Row : cpu usage percentage(%'s)​ as User processes of CPU, System processes of CPU, Priority upgrade nice of CPU, Percentage of the CPU not used, Processes waiting for I/O operations of CPU, Serving hardware interrupts of CPU, Percentage of the CPU serving software interrupts

Sixth Row: Processes List running currently. Let’s see what information we can observe in the different columns.

PID – ID of the process
USER – The user that is the owner of the process (root)
PR – priority of the process
NI – The “NICE” value of the process
VIRT – virtual memory used by the process
RES – physical memory used from the process
SHR – shared memory of the process
S – indicates the status of the process: S=sleep R=running Z=zombie (S)
%CPU – This is the percentage of CPU used by this process
%MEM – This is the percentage of RAM used by the process
TIME+ –This is the total time of activity of this process
COMMAND – And this is the name of the process

rsync command

rsync options source destination

For copying and synchronizing files and directories locally as well as remotely. It is used to perform data backups and mirroring between two Linux machines. It copies the whole content of a file or a directory from source to destination and from next time, copies only the changed blocks and bytes to the target.
Options:
-v : verbose
-r : copies data recursively (but don’t preserve timestamps and permission while transferring data
-a : archive mode, archive mode allows copying files recursively and it also preserves symbolic links, file permissions, user & group ownerships and timestamps
-z : compress file data
-h : human-readable, output numbers in a human-readable format

Web Hosting Review

It’s never been easier to compare web hosts.

Ananova Pillars

Taking the guesswork out of web hosting

Ananova is the Consumer Reports of web hosting – the trusted source anyone can go to for thorough, current, and honest reviews so they can make the most educated decisions and investments possible when choosing a web hosting providers.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here:
Cookie Policy

Data-Driven Reviews

Current & accurate reviews are based on data and supported by real user experiences.

The goal is to deliver the most accurate information possible based on the needs of the majority of website owners and developers, and Ananova reports deliver the most reliable indicators of web host performance.